The network security test lab: a step-by-step guide
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Indianapolis, IN
Wiley
[2015]
|
Schlagworte: | |
Online-Zugang: | FLA01 FRO01 FWS01 FWS02 UBG01 Volltext |
Beschreibung: | Includes index |
Beschreibung: | 1 Online-Ressource (480 Seiten) |
ISBN: | 9781119183433 111918343X 9781118987155 1118987152 9781118987131 1118987136 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043397987 | ||
003 | DE-604 | ||
005 | 20230127 | ||
007 | cr|uuu---uuuuu | ||
008 | 160222s2015 |||| o||u| ||||||eng d | ||
020 | |a 9781119183433 |c Online |9 978-1-119-18343-3 | ||
020 | |a 111918343X |c Online |9 1-119-18343-X | ||
020 | |a 9781118987155 |c electronic bk. |9 978-1-118-98715-5 | ||
020 | |a 1118987152 |c electronic bk. |9 1-118-98715-2 | ||
020 | |a 9781118987131 |c electronic bk. |9 978-1-118-98713-1 | ||
020 | |a 1118987136 |c electronic bk. |9 1-118-98713-6 | ||
024 | 7 | |a 10.1002/9781119183433 |2 doi | |
035 | |a (ZDB-35-WIC)ocn918135837 | ||
035 | |a (OCoLC)918135837 | ||
035 | |a (DE-599)BVBBV043397987 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-860 |a DE-861 |a DE-863 |a DE-862 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Gregg, Michael |e Verfasser |0 (DE-588)1068830255 |4 aut | |
245 | 1 | 0 | |a The network security test lab |b a step-by-step guide |c Michael Gregg |
264 | 1 | |a Indianapolis, IN |b Wiley |c [2015] | |
300 | |a 1 Online-Ressource (480 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
650 | 7 | |a COMPUTERS /Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security / Evaluation |2 fast | |
650 | 4 | |a Computer security / Evaluation | |
650 | 4 | |a Computer networks / Security measures | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
653 | |a Electronic books | ||
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-118-98705-6 |z 1-118-98705-5 |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183433 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028816571 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183433 |l FLA01 |p ZDB-35-WIC |q FLA_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183433 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183433 |l FWS01 |p ZDB-35-WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183433 |l FWS02 |p ZDB-35-WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183433 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 1028245 |
---|---|
_version_ | 1806175016878866432 |
any_adam_object | |
author | Gregg, Michael |
author_GND | (DE-588)1068830255 |
author_facet | Gregg, Michael |
author_role | aut |
author_sort | Gregg, Michael |
author_variant | m g mg |
building | Verbundindex |
bvnumber | BV043397987 |
collection | ZDB-35-WIC |
ctrlnum | (ZDB-35-WIC)ocn918135837 (OCoLC)918135837 (DE-599)BVBBV043397987 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02835nmm a2200625zc 4500</leader><controlfield tag="001">BV043397987</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230127 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160222s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119183433</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-119-18343-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">111918343X</subfield><subfield code="c">Online</subfield><subfield code="9">1-119-18343-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118987155</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-98715-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118987152</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-98715-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118987131</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-118-98713-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118987136</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-118-98713-6</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781119183433</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-35-WIC)ocn918135837</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)918135837</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043397987</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-862</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gregg, Michael</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1068830255</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The network security test lab</subfield><subfield code="b">a step-by-step guide</subfield><subfield code="c">Michael Gregg</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, IN</subfield><subfield code="b">Wiley</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (480 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS /Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Evaluation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security / Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-118-98705-6</subfield><subfield code="z">1-118-98705-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183433</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028816571</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183433</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FLA_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183433</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183433</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183433</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183433</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043397987 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T10:58:44Z |
institution | BVB |
isbn | 9781119183433 111918343X 9781118987155 1118987152 9781118987131 1118987136 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028816571 |
oclc_num | 918135837 |
open_access_boolean | |
owner | DE-860 DE-861 DE-863 DE-BY-FWS DE-862 DE-BY-FWS |
owner_facet | DE-860 DE-861 DE-863 DE-BY-FWS DE-862 DE-BY-FWS |
physical | 1 Online-Ressource (480 Seiten) |
psigel | ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC FLA_PDA_WIC_Kauf ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBG_PDA_WIC |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Wiley |
record_format | marc |
spellingShingle | Gregg, Michael The network security test lab a step-by-step guide COMPUTERS /Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security / Evaluation fast Computer security / Evaluation Computer networks / Security measures Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4070085-9 |
title | The network security test lab a step-by-step guide |
title_auth | The network security test lab a step-by-step guide |
title_exact_search | The network security test lab a step-by-step guide |
title_full | The network security test lab a step-by-step guide Michael Gregg |
title_fullStr | The network security test lab a step-by-step guide Michael Gregg |
title_full_unstemmed | The network security test lab a step-by-step guide Michael Gregg |
title_short | The network security test lab |
title_sort | the network security test lab a step by step guide |
title_sub | a step-by-step guide |
topic | COMPUTERS /Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security / Evaluation fast Computer security / Evaluation Computer networks / Security measures Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | COMPUTERS /Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security / Evaluation Datensicherung Rechnernetz |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9781119183433 |
work_keys_str_mv | AT greggmichael thenetworksecuritytestlabastepbystepguide |